Files
device_google_wahoo/sepolicy/vendor/system_server.te
Max Bires 5e53707061 Removing binder_call's from system_server
They no longer appear to be in use, no denials are seen from
system_server after removal

Bug: 34784662
Bug: 36867326
Test: system_server functions normally
Change-Id: Ifca772bc60bd67b14fe695737a7fc563810cd592
2017-06-21 14:02:08 -07:00

19 lines
826 B
Plaintext

allow system_server self:socket ioctl;
allowxperm system_server self:socket ioctl msm_sock_ipc_ioctls;
binder_call(system_server, hal_camera_default)
allow system_server persist_file:dir search;
allow system_server persist_sensors_file:dir search;
allow system_server persist_sensors_file:file r_file_perms;
allow system_server location_data_file:dir create_dir_perms;
allow system_server location_data_file:file create_file_perms;
allow system_server wlan_device:chr_file rw_file_perms;
# TODO(b/30675296): Remove following dontaudit's upon resolution of this bug
# The timerslack_ns denials spam the system really horribly
dontaudit system_server audioserver:file write;
dontaudit system_server untrusted_app:file write;
dontaudit system_server hal_audio_default:file write;
dontaudit system_server appdomain:file write;